Zyxel is aware of the recently disclosed vulnerabilities of dnsmasq, as identified in US-CERT vulnerability note VU#973527 with vulnerability IDs CVE-2017-14491 through CVE-2017-14496 and CVE-2017-13704, as listed in table 1.
What are the vulnerabilities?
Dnsmasq is a piece of open-source software widely used in Android, Linux and a variety of networking equipment operating systems. The vulnerabilities are present in dnsmasq version 2.77 and earlier; version 2.78 of dnsmasq has been released to address these vulnerabilities.
|CVE-2017-14491||Heap-based Buffer Overflow||DNS|
|CVE-2017-14492||Heap-based Buffer Overflow||DHCP|
|CVE-2017-14493||Stack-based Buffer Overflow||DHCP|
|CVE-2017-14495||Uncontrolled Resource Consumption
Please see: https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html for more technical information.
How are Zyxel resolving the vulnerabilities?
At Zyxel we treat security as a top priority and we have conducted a thorough investigation and identified a list of vulnerable products within their warranty and support period, as shown in table 2 below. For products not listed, they are not affected because they do not make use of dnsmasq.
We are now deploying or backporting the latest version of dnsmasq (version 2.78) into the vulnerable products.
Please refer to table 2 for the detailed release schedule. The patch firmware will be available for download at Zyxel Support Center .
|Product||Series/Model||Patch firmware version||Availability|
|DSL CPE||AMG1302-T11C||ABCG12C0||Feb 2018|
|VMG3312-T series||ABFX1C0||Dec 2017|
|VMG3625-T series||ABIE1C0||Oct 2017|
|XMG3512-B series||ABDR1C0||Mar 2018|
|DSL CPE (Gemini)||Gateway 400||22.214.171.124.03||13-Oct 2017|
|Speedlink 5501/6501||126.96.36.199.06||13-Oct 2017|
|Speedlink 5502||7.39.2.01.00||27-Oct 2017|
|Ethernet gateway||EMG2306||V1.00(AAJM.5)C0||Dec 2017|
|GPON ONT||PMG5317-T20A||V521ABCI4C0||30-Nov 2017|
|Home router||NBG6515||V1.00(AXS.5)C0||Feb 2018|
|LTE CPE||LTE4506-M606||V1.00(ABDO.3)C0||15-Dec 2017|
|WiFi system||WSQ50||V1.00(ABKJ.2)C0||10-Nov 2017|
|Wireless extender||WAP6806||V1.00(ABAL.6)C0||18-Feb 2018|
What should I do now to protect against the vulnerabilities?
The following short-term mitigations could be put in place to remove or reduce the threat:
For more information and technical details regarding the vulnerabilities please see below references:
Please contact your local service representatives if you require further information or assistance. To report a vulnerability, please contact firstname.lastname@example.org